DNAT Now Working

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The DNAT is now working thanks Alistair...
The reason I was seeing it get dropped inbound on eth1 is that I was
accessing the server from my internal LAN. Not a problem...
The reason I was working with PREROUTING was to ensure that  the IPtables
looging app I am finishing will accomodate DNAT,PREROUTING,FORWARD dropped
traffic. I already have POSTROUTING,SNAT,and FORWARD logging working.
Thanks for your help.
Will

BEFORE
# Pre-Routing Redirect for Web Server. in from public ip (eth4) to pss1
(eth3)
iptables -A FORWARD -i eth4 -o eth3 -p tcp --sport $unprivports -d
10.0.0.57 --dport
8080 -m state --state NEW -j ACCEPT
iptables -A FORWARD -i eth3 -o eth4 -m state --state ESTABLISHED,RELATED
-j ACCEPT
iptables -A FORWARD -i eth4 -o eth3 -m state --state ESTABLISHED,RELATED
-j ACCEPT
iptables -t nat -A PREROUTING -i eth4 -p tcp --sport $unprivports -d
$ExtIP2 --dport
8080 -j DNAT --to-destination 10.0.0.57:8080

AFTER
PREROUTE rules at top of list, since preroute is hit first....
# Pre-Routing Redirect for Web Server. in from public ip (eth4) to pss1
(eth3)
iptables -t nat -A PREROUTING -i eth0 -p tcp --sport $unprivports -d
$ExtIP1 --dport
80 -j DNAT --to-destination 10.0.0.57:8080
iptables -t nat -A PREROUTING -i eth0 -p tcp --sport $unprivports -d
$ExtIP1 --dport
22 -j DNAT --to-destination 10.0.0.57:5757




AFTER
forward rules at bottom...
#   Forward
#Forward for pss2
iptables -A FORWARD -i eth0 -o eth3 -p tcp -s x.x.x.x --sport $unprivports -d
10.0.0.57 --dport 8080 -m state --state NEW -j ACCEPT
iptables -A FORWARD -i eth0 -o eth3 -p tcp -s x.x.x.x --sport $unprivports -d
10.0.0.57 --dport 5757 -m state --state NEW -j ACCEPT
iptables -A FORWARD -i eth3 -o eth0 -m state --state ESTABLISHED,RELATED
-j ACCEPT
iptables -A FORWARD -i eth0 -o eth3 -m state --state ESTABLISHED,RELATED
-j ACCEPT
# Forward for internal LAN
iptables -A FORWARD -o eth0 -m state --state NEW,ESTABLISHED,RELATED -j
ACCEPT
iptables -A FORWARD -o eth1 -m state --state NEW,ESTABLISHED,RELATED -j
ACCEPT
###########################################################
## Log anything not allowed via FORWARD Rule
iptables -A FORWARD -j LOG --log-prefix "Forward Host Deny Fwd"
#######################################################################################################
#Postrouting
iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source $ExtIP1









[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux